3 Backup What is backup? backup is part of a larger domain called data security: integrity, protection: cryptography availability, redundancy: mirroring / RAID Why Backup? Software and Hardware failures are a common thing in the computer world. Any number of occurrences can cause loss of valuable data.

5 A common backup strategy Do nothing Not a computer program, but it is the most widely used backup strategy. There are no initial costs. There is no backup schedule to follow. Just say no. If something happens to your data, grin and bear it! If your time and your data is worth little to nothing, then Do nothing ' is the most suitable backup program for your computer. But beware, UNIX is a useful tool, you may find that within six months you have a collection of files that are valuable to you. Do nothing is the correct backup method for /usr/obj, /usr/src and other directory trees that can be exactly recreated by your computer but if in doubt, BACK IT UP!

6 Creating a backup strategy This is driven by many variables. Such as: How long can you be offline before your org disappears? Do you have legal responsibilities. Levels of backup planned: Daily Weekly Monthly Quarterly Semi-annually Annually How long must you keep the data? How do you restore the data? Does your restore need to be bare metal or just data? Bare metal, fast restore, long-term storage = more $$

8 dd The lowest level type of backup Bit-for-bit copy For example: dd if=/dev/ad0s1a of=/backup/root Exact copy, but not efficient if you only use 100 MB on a 1 GB partition, you still end up with a backup of 1 GB compression helps, but you still spend time copying unused space Best for doing system recovery, or Copying media (CD-ROMs, DVDs, etc.)

9 Dump The traditional UNIX backup programs dump and restore. Works at inode level Takes backups of entire file systems, but only the used space It is unable to backup only part of a file system It does not backup across mount points (directory tree that spans more than one file system) Note: If you use dump on your / partition, you would not back up /home, /usr or or any other mounted FS. You must explicitly run dump for each FS.

10 Dump Dump can backup to several media local file remote file tape Dump can take incremental dumps only files that have changed are backup up

12 Tar tar(1) (Tape Archive) dates back to Version 6 of AT&T UNIX (circa 1975). tar operates in cooperation with the file system; tar writes files and directories to tape or to a file. Just like with dump, one can use ssh to backup across the network: # tar -cfz - / (ssh remote; cat >/backups/backup-0425.tgz)

13 Examples using tar Let's take a backup of /etc where most configuration files reside, and place it in /home/ backups: # mkdir /home/backups # tar -cvf /home/backups/etc.tar /etc Note: The -c option to tar tells it to create an archive, -v specifies verbose output and -f specifies the file to be either written to or read from You'll see quite a lot of output as tar creates the archive at this point.

14 Examples using tar Now we check whether our archive has actually been created # cd /home/backups # ls This now show us a new file in this directory etc.tar If we now wanted to view the contents of this backup we can run # tar -tvf etc.tar

15 Examples using tar This will show you the contents of the etc directory as you backed it up. To actually restore and and unpack the contents that were backup up previously: # cd /home/backups # tar -xvf etc.tar

16 Examples using tar Notice that the restore actually creates a new directory etc where you are located not in /etc! This is because tar by default removes the leading '/' from the directories it has backed up in order not to overwrite the original files on your system when you choose to do a restore (a security consideration)

17 Rsync Another very powerful tool is rsync Rsync is very efficient: it only transfers files that have changed, and for those files, only the parts of the files that have changed This is very efficient for large trees with many files, some of them large Great for replicating a server off-site, or for doing quick backups for a migration.

18 Rsync Combined with the --link-dest option, it allows to do snapshot-like backups. --link-dest takes the newest backup, and makes links (which take 0 space) to the files that have not changed, and replicates those that have changed Allows for backup.0, backup.1, backup.2, backup.3, where backup.x is a COMPLETE copy of the replicated source, but the disk space used is ONLY the difference.

21 Other possible Backup methods Disk duplication Using the dd command mentioned earlier, it is possible to duplicate your entire disk block by block on another disk. However the source and destination disk should be identical in size or the destination must be bigger than the source. Another way of doing this is using RAID1 mirroring and hot swappable disks: make sure the RAID volume is rebuilt (OK) remove one of the two disks (call it backup ) replace backup with a fresh disk, let the RAID rebuild take backup home Remember: RAID or mirroring is not backup. An rm -rf / on your RAID set works very well!

22 Other possible Backup methods Disk duplication (2) instead of mirroring the two disks, make two filesystems, and use rsync to copy every night from disk 1 to disk 2 in case of user error (rm -rf), you can recover from disk 2, without having to pull the backup tapes out of the safe NOTE: IT DOES NOT HELP IF THE SERVER IS STOLEN OR THERE IS A FIRE, IF BOTH DISKS ARE IN THE MACHINE!

23 Networked backup systems There are a number of networked backup systems out there for backing up many servers to one or more backup servers, using tape drives or disk storage. In the Open Source world, two backup systems stand out: AMANDA - BACULA -

24 Amanda Advanced Maryland Automatic Network Disk Archiver Has been around for many years Networked backup Support incremental backups to disk, tape Can backup to a holding disk, flush to tape later Encrypted data flows and backup data Tape library / loader control and labeling Windows backup using a windows client All source code for Amanda is open source

25 Bacula Written by the people who invented AutoCAD Extremely popular and well-tested. Claims to be the most popular Open Source, Enterprise-level backup package around. Impressive documentation (400- pages!), including a developer's guide and tutorial Support incremental backups to disk, tape Complete SQL backend (MySQL, PgSQL, SQLite) Encrypted data flows using TLS (standard!) Tape library / loader control and labelling Native Windows client Good documented scenarios for specific backup cases, including complete bare metal restore

27 Reminder: Backup security 1. Take the disks / tapes / CDs off site! -> it does not help if there is a fire or if tapes are stolen 2. Consider encrypting the data on the disks / tapes / CDs -> what happens if the tapes are stolen? what happens when you throw them out?

29 Types of redundancy There are different levels of redundancy: none if a disk crashes, data is lost disk DATA RAID1 2 disks are mirrored, data is written to both disks at any time. One disk can be lost without losing data. DATA disk DATA disk

34 RAID 5 Striping +Distributed Parity Data is written across multiple disks (striping). Parity is written across all disks. Most popular type of RAID after RAID 1. Can lose any 1 disk (set of 3) Has serious subtle issues!

35 RAID 6 Striping+Double Distributed Parity Data is written across multiple disks (striping). Parity is written across all disks multiple times. Fixes issues with RAID 5. Can lose any 2 disk (set of 4). Fixes issue with 1TB+ drives.

36 RAID 1+0 or 10 Mirrored Sets in a Striped Set Data is mirrored in multiple sets and sets are striped. Provides performance and fault tolerance. Can lose multiple disks as long as no one mirror loses all disks. Requires more disks for same storage space. Referred to as nested or hybrid RAID.

37 RAID Controller Failure What do you do? Use a hot spare RAID Card. Card must be identical. Cards must support hot -spare in BIOS. Generally connected by onboard data path, or via cable between both cards. Otherwise, at a minimum, buy 2xRAID card when building your array. If many arrays buy extra cards.

39 Hardware or software? In general, hardware RAID is more transparent to the user, and disk replacement is straightforward: remove defective disk install new disk RAID controller detects this and starts rebuilding on new disk (Note: real hardware RAID controllers, NOT BIOS RAID such as Promise)

40 Hardware or software? RAID3 and 5 can be complex to implement in software (in the OS), so hardware might be a better choice But what happens if the RAID controller dies? How does one recover if one does not have a spare controller? Consider having a spare controller for RAID3/RAID5/RAID6/RAID1+0 (Note: we mean real hardware RAID controllers, not BIOS software RAID such as Promise)

41 Hardware or software? RAID1 is easy to recover from and easier to implement in software (within the OS) worst case, all one needs is to skip a header at the beginning of each disk. FreeBSD and Linux have very good software RAID implementations nowadays In FreeBSD, at least 3 implementations: gmirror ccd gvinum (also RAID5, but not recommended) But you want to use ZFS

42 ZFS Incredibly flexible, incredibly powerful file system available natively in FreeBSD. For all practical purposes has no file system or file size limits. Implements functionality of RAID6 with RAID-Z2 option of double-parity striping in the ZFS volume manage. ZFS creates FS over Volume over Hardware. ZFS knows about the hardware layer. Volume recovery is fast! Only recover data, not empty areas of disk (RAID recovers all bits in an array.

System Administration Backups Why Backup? Problems will occur Hardware failure Accidental deletion Unwanted changes Backup Philosophies At mimimum back up what you can not replicate Your documents, important

System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most

ZFS Backup Platform Senior Systems Analyst TalkTalk Group http://milek.blogspot.com The Problem Needed to add 100's new clients to backup But already run out of client licenses No spare capacity left (tapes,

Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,

REMOTE OFFICE BACKUP Remote offices present IT managers with a number of technical challenges. Often businesses use remote offices to expand into either new markets, or into new geographical areas. Many

SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion

Bacula The Network Backup Solution Presented by Kern Sibbald at FOSDEM 25 February 2007 in Brussels Bacula the Network Backup Tool for Linux, Mac, Unix and Windows Introduction Do you do backups? No Yes,

the Availability Digest Unix Backup and Recovery February 2007 Backing up is a pain. But it is the restore that counts. This is the message that Curtis Preston delivers in his book, Unix Backup and Recovery.

For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

Preface Part I. Introduction 1. The Philosophy of Backup Champagne Backup on a Beer Budget Why Should I Read This Book? Why Back Up? Wax On, Wax Off: Finding a Balance 2. Backing It All Up Don't Skip This

For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up

Disk drives are an integral part of any computing system. Disk drives are usually where the operating system and all of an enterprise or individual s data are stored. They are also one of the weakest links

CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues

The Remote Data Backup & Restore Service from How does Work? is an agentless method of backup this means that you can backup as many PCs, servers, and applications as you wish, just by installing the TP-Client

Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.

Linux Software Raid Aug 2010 Mark A. Davis a What is RAID? Redundant Array of Inexpensive/Independent Drives It is a method of combining more than one hard drive into a logic unit for the purpose of: Increasing

Bacula The Network Backup Tool for *BSD, Linux, Mac, Unix and Windows It comes by night and sucks the vital essence from your computers. Spark support Open Source Project Bacula is a network backup solution,

Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and

COMPARISON www.backupassist.com 2 What s new in BackupAssist version 6? There are three main reasons why you should upgrade to BackupAssist v6: 1. To keep up with the latest best practice backup standards

Protect your data, against any disaster, in a safe place. backupremotebackupremotebackupremoteb What makes FORTIKUP the ultimate backup solution 1. Components with robust features The core server Offsite

DataSet Online Backup Service Fully Automatic 100% Reliable Best Value For Your Money Data Loss is a Nightmare Your data is worth US $10,000.00 per MB! You have invested a lot of TIME, MONEY and ENERGY

Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces

Xserve G5 Using the Hardware RAID PCI Card Instructions for using the software provided with the Hardware RAID PCI Card 2 Using the Hardware RAID PCI Card You use command-line tools to configure and manage

Usage of the mass storage system K. Rosbach PPS 19-Feb-2008 Disclaimer This is just a summary based on the information available online at http://dv-zeuthen.desy.de/services/dcache_osm/e717/index_eng.html

Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

Bacula The Network Backup Solution Presented by Kern Sibbald at UKUUG 20 February 2008 in London Bacula the Network Backup Tool for *BSD, Linux, Mac, Unix and Windows Open Source Project Bacula is a network

The George E. Brown, Jr. Network for Earthquake Engineering Simulation NEES Experimental Site Backup Plan at NEES@Lehigh Last Modified November 12, 2012 Acknowledgement: This work was supported primarily

Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious

Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the

For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

MegaRAID SAS User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an overview

9916 Brooklet Drive Houston, Texas 77099 Phone 832-327-0316 www.safinatechnolgies.com RAID Made Easy By Jon L. Jacobi, PCWorld What is RAID, why do you need it, and what are all those mode numbers that

The ultimate backup solution for your company Data loss is a nightmare (1) Your data are growing exponentially If you find yourself now in a situation where you have to deal with an explosion in the volume

Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with

Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos

Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

The Trouble with Backups Backups are central to any data protection strategy, but by some estimates more than half of all backups fail either in whole or in part. When you look at the reasons for why they

General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These